• There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

EN 300 812 : 2.1.1

Current

Current

The latest, up-to-date edition.

TERRESTRIAL TRUNKED RADIO (TETRA); SECURITY ASPECTS; SUBSCRIBER IDENTITY MODULE TO MOBILE EQUIPMENT (SIM-ME) INTERFACE

Available format(s)

Hardcopy , PDF

Language(s)

English

Intellectual Property Rights
Foreword
1 Scope
2 References
3 Definitions, symbols and abbreviations
   3.1 Definitions
   3.2 Symbols
   3.3 Abbreviations
4 SIM characteristics
   4.1 Format and layout
       4.1.1 SIM
       4.1.2 Plug-in SIM
   4.2 Temperature range for card operation
   4.3 Contacts
       4.3.1 Provision of contacts
       4.3.2 Activation and deactivation
       4.3.3 Inactive contacts (contact conditions in the
             ME switched-off state)
       4.3.4 Contact pressure
   4.4 Precedence (multiple SIM operation)
   4.5 Static protection
5 Electronic signals and transmission protocols
   5.1 Supply voltage Vcc (contact C1)
        5.1.1 5 V technology SIM
        5.1.2 3 V technology SIM
        5.1.3 3 V technology SIM identification
        5.1.4 3 V technology ME
        5.1.5 3 V Only ME
        5.1.6 Activation and deactivation of 3 V technology SIM
        5.1.7 Supply voltage switch
        5.1.8 Cross compatibility
        5.1.9 Technology outlook
   5.2 Reset (RST) (contact C2)
   5.3 Programming voltage Vpp (contact C6)
   5.4 Clock CLK (contact C3)
   5.5 Input/Output (I/O) (contact C7)
   5.6 States
   5.7 Baud rate
   5.8 Answer To Reset (ATR)
   5.9 Bit/character duration and sampling time
   5.10 Error handling
6 Logical model
   6.1 General description
   6.2 File identifier
   6.3 Dedicated Files (DF)
   6.4 Elementary Files (EF)
       6.4.1 Transparent EF
       6.4.2 Linear fixed EF
       6.4.3 Key EF
       6.4.4 Cyclic EF
   6.5 Methods for selecting a file
   6.6 Reservation of file IDs
7 Security features
   7.1 Authentication and cipher key generation procedure
   7.2 Support of Over The Air Re-keying (OTAR) distribution
       of cipher keys
   7.3 Support of SIM-ME enhanced security
   7.4 File access conditions
   7.5 Storage of DCK
8 Description of the functions
   8.1 SELECT
   8.2 STATUS
   8.3 READ BINARY
   8.4 UPDATE BINARY
   8.5 READ RECORD
   8.6 READ KEY
   8.7 UPDATE RECORD
   8.8 SEEK
   8.9 VERIFY CHV
   8.10 CHANGE CHV
   8.11 DISABLE CHV
   8.12 ENABLE CHV
   8.13 UNBLOCK CHV
   8.14 INVALIDATE
   8.15 REHABILITATE
   8.16 TETRA authentication algorithms
        8.16.1 GET RANDOM
        8.16.2 TA11/TA12 ALGORITHM
        8.16.3 TA21/TA22 ALGORITHM
        8.16.4 TB4/TE ALGORITHM
   8.17 OTAR algorithms
        8.17.1 TA32 ALGORITHM
        8.17.2 TA41/TA82 ALGORITHM
        8.17.3 TA41/TA52 ALGORITHM
        8.17.4 TA71 ALGORITHM
9 Description of the commands
   9.1 Mapping principles
   9.2 Coding of the commands
       9.2.1 SELECT
       9.2.2 STATUS
       9.2.3 READ BINARY
       9.2.4 UPDATE BINARY
       9.2.5 READ RECORD
       9.2.6 UPDATE RECORD
       9.2.7 READ KEY
       9.2.8 SEEK
       9.2.9 VERIFY CHV
       9.2.10 CHANGE CHV
       9.2.11 DISABLE CHV
       9.2.12 ENABLE CHV
       9.2.13 UNBLOCK CHV
       9.2.14 INVALIDATE
       9.2.15 REHABILITATE
       9.2.16 GET RANDOM
       9.2.17 TA11/TA12 ALGORITHM
       9.2.18 TA21/TA22 ALGORITHM
       9.2.19 TB4/TE ALGORITHM
       9.2.20 TA32 ALGORITHM
       9.2.21 TA41/TA82 ALGORITHM
       9.2.22 TA41/TA52 ALGORITHM
       9.2.23 TA71 ALGORITHM
       9.2.24 GET RESPONSE
   9.3 Definitions and coding
   9.4 Status conditions returned by the card
       9.4.1 Responses to commands which are correctly executed
       9.4.2 Memory management
       9.4.3 Referencing management
       9.4.4 Security management
       9.4.5 Application independent errors
       9.4.6 Commands versus possible status responses
10 Contents of the EFs
   10.1 Void
   10.2 Contents of the EFs at the MF level
        10.2.1 EFICCID (Card Identification)
        10.2.2 EFDIR (Application directory)
        10.2.3 EFLP (Language Preference)
   10.3 Contents of the EFs at the TETRA application level
        10.3.1 EFSST (SIM Service Table)
        10.3.2 EFITSI (Individual Tetra Subscriber Identity)
        10.3.3 EFITSIDIS (ITSI Disabled)
        10.3.4 EFUNAME (Username)
        10.3.5 EFSCT (Subscriber Class Table)
        10.3.6 EFPHASE (Phase identification)
        10.3.7 EFCCK (Common Cipher Key)
        10.3.8 EFCCKLOC (CCK location areas)
        10.3.9 EFSCK (Static Cipher Keys)
        10.3.10 EFGSSIS (Static GSSIs)
        10.3.11 EFGRDS (Group related data for static GSSIs)
        10.3.12 EFGSSID (Dynamic GSSIs)
        10.3.13 EFGRDD (Group related data for dynamic GSSIs)
        10.3.14 EFGCK (Group Cipher Keys)
        10.3.15 EFMGCK (Modified Group Cipher Keys)
        10.3.16 EFGINFO (User's group information)
        10.3.17 EFSEC (Security settings)
        10.3.18 EFFORBID (Forbidden networks)
        10.3.19 EFPREF (Preferred networks)
        10.3.20 EFSPN (Service Provider Name)
        10.3.21 EFLOCI (Location information)
        10.3.22 EFDNWRK (Broadcast network information)
        10.3.23 EFNWT (Network table)
        10.3.24 EFGWT (Gateway table)
        10.3.25 EFCMT (Call Modifier Table)
        10.3.26 EFADNGWT (Abbreviated Dialling Number with
                Gateways)
        10.3.27 EFGWTEXT1 (Gateway Extension1)
        10.3.28 EFADNTETRA (Abbreviated dialling numbers for
                TETRA network)
        10.3.29 EFEXTA (Extension A)
        10.3.30 EFFDNGWT (Fixed dialling numbers with Gateways)
        10.3.31 EFGWTEXT2 (Gateway Extension2)
        10.3.32 EFFDNTETRA (Fixed dialling numbers for TETRA
                network)
        10.3.33 EFEXTB (Extension B)
        10.3.34 EFLNDGWT (Last number dialled with Gateways)
        10.3.35 EFLNDTETRA (Last numbers dialled for TETRA
                network)
        10.3.36 EFSDNGWT (Service Dialling Numbers with gateway)
        10.3.37 EFGWTEXT3 (Gateway Extension3)
        10.3.38 EFSDNTETRA (Service Dialling Numbers for TETRA
                network)
        10.3.39 EFSTXT (Status message texts)
        10.3.40 EFMSGTXT (SDS-1 message texts)
        10.3.41 EFSDS123 (Status and SDS type 1, 2 and 3 message
                storage)
        10.3.42 EFSDS4 (SDS type 4 message storage)
        10.3.43 EFMSGEXT (Message Extension)
        10.3.44 EFEADDR (Emergency addresses)
        10.3.45 EFEINFO (Emergency call information)
        10.3.46 EFDMOCh (DMO channel information)
        10.3.47 EFMSCh (MS allocation of DMO channels)
        10.3.48 EFKH (List of Key Holders)
        10.3.49 EFREPGATE (DMO repeater and gateway list)
        10.3.50 EFAD (Administrative data)
        10.3.51 EFPREF_LA (Preferred location areas)
        10.3.52 EFLNDComp (Composite LND file)
        10.3.53 EF DFLTSTSTGT (Status Default Target)
        10.3.54 EFSDSMEM_STATUS (SDS Memory Status)
        10.3.55 EFWELCOME (Welcome Message)
        10.3.56 EFSDSR (SDS delivery report)
        10.3.57 EFSDSP (SDS parameters)
        10.3.58 EFDIALSC (Dialling schemes for TETRA network)
        10.3.59 EFAPN (APN table)
        10.3.60 EFPNI (Private Number Information)
   10.4 Contents of the EFs at the Telecom level
        10.4.1 EFADN (Abbreviated dialling numbers)
        10.4.2 EFFDN (Fixed dialling numbers)
        10.4.3 EFMSISDN (MSISDN)
        10.4.4 EFLND (Last number dialled)
        10.4.5 EFSDN (Service Dialling Numbers)
        10.4.6 EFEXT1 (Extension1)
        10.4.7 EFEXT2 (Extension2)
        10.4.8 EFEXT3 (Extension3)
   10.5 Files of TETRA
11 Application protocol
   11.1 General procedures
        11.1.1 Reading an EF
        11.1.2 Updating an EF
        11.1.3 Invalidating an EF
   11.2 SIM management procedures
        11.2.1 SIM initialization
        11.2.2 TETRA session initialization
        11.2.3 TETRA session termination
        11.2.4 Language preference request
        11.2.5 Administrative information request
        11.2.6 SIM service table request
        11.2.7 SIM phase request
        11.2.8 SIM presence detect
        11.2.9 SIM card number request
        11.2.10 Common Cipher Key request
   11.3 CHV related procedures
        11.3.1 CHV verification
        11.3.2 CHV value substitution
        11.3.3 CHV disabling
        11.3.4 CHV enabling
        11.3.5 CHV unblocking
   11.4 TETRA security related procedures
        11.4.1 Authentication procedures and generation of DCK
               11.4.1.1 Mutual authentication requirement
                        request
               11.4.1.2 SIM authentication
               11.4.1.3 SwMI authentication
        11.4.2 TETRA OTAR key computation (CCK, GCK, SCK)
               11.4.2.1 CCK distribution
               11.4.2.2 CCK changeover
               11.4.2.3 GCK distribution
               11.4.2.4 SCK distribution
        11.4.3 ITSI request
        11.4.4 ITSI disabling/re-enabling
   11.5 Subscription related procedures
        11.5.1 Username request
        11.5.2 ITSI temporarily disabled enquiry
        11.5.3 Subscriber class request
        11.5.4 Void
        11.5.5 Group identity information
                11.5.5.1 Static Group identity information
                11.5.5.2 Dynamic Group identity information
        11.5.6 Group related data
        11.5.7 User's group information
        11.5.8 Call modifiers
        11.5.9 Service Provider Name
        11.5.10 DMO channel procedures
        11.5.11 Emergency addresses
        11.5.12 Interrupted emergency call request
   11.6 Network related procedures
        11.6.1 Forbidden networks
        11.6.2 Preferred networks
   11.7 Dialling number related procedures
        11.7.1 Dialling numbers under DFTETRA
        11.7.2 Dialling numbers under DFTELECOM
        11.7.3 FDNGWT specific procedures
               11.7.3.1 FDNGWT capability request
               11.7.3.2 FDNGWT disabling
               11.7.3.3 FDNGWT enabling
   11.8 Status and short data message procedures
        11.8.1 Display of status message texts
        11.8.2 Display of SDS1 message texts
        11.8.3 Storage of status and SDS messages types
               1, 2 and 3
        11.8.4 Storage of SDS messages type 4
        11.8.5 SDS delivery report
        11.8.6 Default Status Target
Annex A (normative): Plug-in SIM
Annex B (informative): FDN Procedures
Annex C (informative): Suggested contents of EFs at
        pre-personalization
      C.1 Contents of the EFs at the MF level
      C.2 Contents of the EFs at the TETRA application level
      C.3 Contents of the EFs at the Telecom Level
Annex D (normative): Database structure for group IDs and
        phone books
Annex E (informative): Emergency call facilities and procedures
Annex F (informative): Composite List of Last Dialled Numbers
Annex G (informative): Bibliography
History

Describes the interface between the Subscriber Identity Module (SIM) and the Mobile Equipment (ME) for use during the network operation phase of TETRA as well as those aspects of the internal organization of the SIM, which are related to the network operation phase.

Committee
TETRA 7
DocumentType
Standard
Pages
156
PublisherName
European Telecommunications Standards Institute
Status
Current

Standards Relationship
NBN EN 300 812 : 2002 Identical
DIN EN 300812:2002-12 Identical
PN EN 300 812 : 2005 Identical
NEN EN 300812 : 2001 Identical

ES 200 812-2 : 2.4.2 TERRESTRIAL TRUNKED RADIO (TETRA); SUBSCRIBER IDENTITY MODULE TO MOBILE EQUIPMENT (TSIM-ME) INTERFACE; PART 2: UNIVERSAL INTEGRATED CIRCUIT CARD (UICC); CHARACTERISTICS OF THE TSIM APPLICATION
TS 100 812-2 : 2.4.1 TERRESTRIAL TRUNKED RADIO (TETRA); SUBSCRIBER IDENTITY MODULE TO MOBILE EQUIPMENT (TSIM-ME) INTERFACE; PART 2: UNIVERSAL INTEGRATED CIRCUIT CARD (UICC); CHARACTERISTICS OF THE TSIM APPLICATION
TR 102 300-5 : 1.4.1 TERRESTRIAL TRUNKED RADIO (TETRA); VOICE PLUS DATA (V+D); DESIGNERS' GUIDE; PART 5: GUIDANCE ON NUMBERING AND ADDRESSING

View more information
£15.00
Excluding VAT

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.